Multiple DeFi Protocols Resume Operations Following GoDaddy Exploit

cropped cropped logofav 1 1

A GoDaddy exploit saw attackers hack multiple DeFi protocols, which have only just come back to regular functionality. In a separate incident, attackers used a malicious advertisement script through Coinzilla to attack CoinGecko and Etherscan.

Several cryptocurrency platforms are resuming functionality following a hack that took place via a GoDaddy exploit late last week. The platforms affected include SpiritSwap, QuickSwap, and Dextools.

The attacker used a phishing attack in an attempt to steal funds. Some platforms have reported thefts, but so far, it only appears to be comparatively small amounts for most platforms.

Users alerted the respective platforms that there were popups from MetaMask asking for a connection to a malicious site.

In a separate incident, CoinGecko and Etherscan were exploited through a third-party service. CoinGecko said that the phishing attack was a result of a malicious advertising script by the crypto advertising network Coinzilla. Etherscan also said that a third-party integration was the cause.

In the case of SpiritSwap, the attacker was able “to modify the frontend to divert funds to a wallet under their own control.” In this case, the attacker was able to make away with $18,000.

Most platforms have announced that they have regained access, but there has been no news on the attackers. Both attacks are bold ones that cover many popular websites, including CoinGecko and Etherscan. There will surely be more attention to using external services as a result.

DeFi platforms not immune to external exploits

The attack is yet another one to take place in the DeFi market. The space is known to be prone to attacks, simply because it sees such a large influx of funds and is the perfect target for hackers looking to make away with funds. However, most attacks are due to flash loan exploits and general code vulnerabilities.

This time, the attack has taken place via a third-party integration, and platforms will have to be wary. If such exploits can take place, then it is possible that other integrations also have vulnerabilities.

This time, the attack has taken place via a third-party integration, and platforms will have to be wary. If such exploits can take place, then it is possible that other integrations also have vulnerabilities.

Disclaimer

All the information contained on our website is published in good faith and for general information purposes only. Any action the reader takes upon the information found on our website is strictly at their own risk.

Share Article
Rahul Nambiampurath

Rahul’s cryptocurrency journey first began in 2014. With a postgraduate degree in finance, he was among the few that first recognized the sheer untapped potential of decentralized technologies. Since then, he has guided a number of startups to navigate the complex digital marketing and media outreach landscapes. His work has even influenced distinguished cryptocurrency exchanges and DeFi platforms worth millions of dollars.

Follow Author